Cisco Blogs


Cisco Blog > Enterprise Networks

How does Cisco Access Switching help address BYOD, Mobility and Security Needs?

November 11, 2013 at 5:45 am PST

Cisco will host a live webcast on Wedn November 13, 2013 to discuss BYOD, mobility, security and how Cisco access switching address these customer needs. If you are reading this blog, there is a good chance that your work is somehow related to these critical areas. To test how widely BYOD, mobility and security impact IT professionals, I’ve used an unscientific way to check it out on several popular online IT web sites. I want to see if they consider at least one of these areas to be their main focus.  Here’s what I’ve found – many of them (although not every single one) are devoted to at least one area. Read More »

Tags: , , , , , , , , ,

Cybersecurity: Where are the Biggest Threats?

Cyber Crime: Identifying the Sources of an Everyday Threat

Cyber crimes, cyber thievery, and cyber warfare have become an everyday reality. In fact, security breaches are so prevalent that, according to a new study from the National Cyber Security Alliance and a private sector firm, 26 percent of Americans have been the victims of a data breach in the past 12 months alone. Not only do breaches reduce citizens’ trust in government to protect their confidential data, they also cost government agencies a significant amount of money. For most CIOs and other government keepers of data, these statistics prompt one immediate question – “Can this happen to us?” Unfortunately, the answer to this question is: yes, it can. Read More »

Tags: , , , , , , , ,

Secure BYOD for Midsize Businesses

The Internet of Everything will connect 50 billion things by 2020.

Your midsize business needs to stay ahead of potential security risks.

Are you ready?

Previously, I wrote about the importance of driving success for midsize businesses. Today I am focusing on security and BYOD for midsize companies.

Are you fully aware of all of the people and devices on your network? Has your business begun implementing BYOD? Read More »

Tags: , , , , , ,

Cisco ISE in the lab.

November 6, 2013 at 7:38 pm PST

My company is in the very early stages of an MDM BYOD project.  As part of that we are looking at the Cisco Identity Service Engine (ISE) as a central piece.  I am about half way through my testing and I thought that I would pass on some of what I have learned so far.  I am far from being an ISE expert and I don’t mention profiling or the advanced features in this post. I have tried them but don’t feel knowledgeable enough to go into these details.

ISE

ISE is an excellent NAC system but it does much more than that.  One of the advantages of trying to configure a new piece of technology yourself is that you learn much more and also other ways to increase the ROI.  The main reason we are interested in ISE is as the enforcement point on our wireless network.  When a device tries to connect to our BYOD network we want ISE to query the MDM server to verify if the device is registered and if not to redirect the device to the MDM provisioning portal.  If the device is registered with MDM ISE will then query AD and verify the user credentials.  This is a core function of ISE and went fairly well. Read More »

Tags: , , , ,

Got Mobility? Check. Now What?

November 4, 2013 at 9:16 am PST

The mobility discussion isn’t fresh off the presses. BYOD isn’t something you have to look up to remember what the D represents. But much of the business-mobility discussion still focuses around smartphones and basic access. It’s a pretty limited view when you consider the potential beyond the petri dish of e-mail and calendaring.

mochachip

Take me to your keyboard…

Having access to my work e-mail and calendar on my smartphone is good stuff. As is having my choice of phones. And even the simple tools benefit my productivity, while letting me have a life beyond my job. Surprise, surprise: Sometimes “work happens” outside the normal work hours of my particular time zone. And, yes, “life happens” during my normal work hours.

I could be productive on a laptop from home, but my dog would soon gnaw through my keyboard in protest. (Hastened by prodding from my kid and a jar of peanut butter.) But she doesn’t mind if I check and answer e-mail at the dog park.

She’s a pretty advanced dog. She even accepts the need for instant messaging and an occasional WebEx conference, although her presence typically requires liberal use of the mute button.

Beyond the Basics
So, what’s missing? Once people get over the novelty of e-mail and calendaring, they look for more. If they can slingshot birds across the universe, book airline flights, and deposit checks on these pocket-sized supercomputers, shouldn’t they be able to do more?

Read More »

Tags: , , , ,